JVNDB-2015-000119

Vulnerability from jvndb - Published: 2015-08-27 15:03 - Updated:2015-09-02 17:57
Severity ?
() - -
Summary
File Encryption Software "ED" where encrypted data may be easier to decipher when files of small size are encrypted
Details
File encyption software "ED" contains an issue when files of small size are encyrpted, they may become easier to decipher in comparison to when files of a larger size are encrypted. When encrypting small files that are smaller than the block size (128 bits), file encryption software "ED" encrypts such files with "a stream cipher combining ECB mode of the selected encryption algorithm on key generation". This results in deciphering the resulting encrypted data to become relatively easy. For more details on this specification, pelase refer to the documentation (http://type74.org/edman5-1.php) provided by the developer. Yutaka Sawada reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000119.html",
  "dc:date": "2015-09-02T17:57+09:00",
  "dcterms:issued": "2015-08-27T15:03+09:00",
  "dcterms:modified": "2015-09-02T17:57+09:00",
  "description": "File encyption software \"ED\" contains an issue when files of small size are encyrpted, they may become easier to decipher in comparison to when files of a larger size are encrypted.\r\n\r\nWhen encrypting small files that are smaller than the block size (128 bits), file encryption software \"ED\" encrypts such files with \"a stream cipher combining ECB mode of the selected encryption algorithm on key generation\". This results in deciphering the resulting encrypted data to become relatively easy. For more details on this specification, pelase refer to the documentation (http://type74.org/edman5-1.php) provided by the developer.\r\n\r\nYutaka Sawada reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000119.html",
  "sec:cpe": {
    "#text": "cpe:/a:type74:ed",
    "@product": "File encryption software \"ED\"",
    "@vendor": "Type74.org",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "2.6",
    "@severity": "Low",
    "@type": "Base",
    "@vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2015-000119",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN91474878/index.html",
      "@id": "JVN#91474878",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2987",
      "@id": "CVE-2015-2987",
      "@source": "CVE"
    },
    {
      "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2987",
      "@id": "CVE-2015-2987",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-DesignError",
      "@title": "No Mapping(CWE-DesignError)"
    }
  ],
  "title": "File Encryption Software \"ED\" where encrypted data may be easier to decipher when files of small size are encrypted"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…